logo

Cybersecurity - Question & Answer

Answering 5 short-answer questions related to wireless network security, contributing factors to the security threat of cyberspace, and proactive measures after an intrusion.

7 Pages1819 Words40 Views
   

Added on  2022-08-13

Cybersecurity - Question & Answer

Answering 5 short-answer questions related to wireless network security, contributing factors to the security threat of cyberspace, and proactive measures after an intrusion.

   Added on 2022-08-13

ShareRelated Documents
Running head: CYBERSECURITY
CYBERSECURITY
Name of the Student
Name of the university
Author note
Cybersecurity - Question & Answer_1
1CYBERSECURITY
1. A colleague asks for your assistance to further secure a department wireless network.
Which of the following wireless security measures would you configure (WPA2-
Enterprise, WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise) and why?
Describe in detail the security configuration settings you would use. Also describe why
you did NOT choose the others.
Ans1. WPA2-Enterprise will be suggested as it is one of the latest security protocols that are
developed by Wi-Fi Alliance. It uses Advanced Encryption Standard or AES and provides
enterprise-grade authentication. WPA2-Enterprise is appropriate for use in organizations.
This security measure is a combination of good password habits and in WPA2-Enterprise
individual users’ access can be abrogated as and when required and the others users are not
affected with this. It is more secure than all of the other mentioned security measures (Bartoli
et al., 2018). The configuration settings to be used are as follows:
a) Setting up the new network
b) Modifying the Wi-Fi connection
c) Certification Authentication configured
d) Authentication with EAP-TLS (method of authentication that is made use of to
authenticate the certificates)
e) Enabling certificate enrolment
In WPA2-Enterprise password used by the user to authenticate him remains same but the key
generated by the password is different for each of the sessions. WPA2-Enterprise was chosen
as it is laced up with advanced authentication as well as encryption techniques. This security
measure was chosen and not the others because the encryption technique used in this is more
updated and appropriate for organizations (Kim, Tague, Lee & Kim 2015). WPA2 Enterprise
uses IEEE 802.1X that provides enterprise-grade authentication.
2. The rapid growth of the Internet is a contributing factor to the security threat of
cyberspace. Discuss other contributing factors to the overall security threat of
cyberspace.
Cybersecurity - Question & Answer_2
2CYBERSECURITY
Ans2. Cybersecurity is being considered as the key component for national security as well
as economic security of a country. Other than Internet, ransomeware evolution, revolution
blockchain, threats related to Internet of Things, expansion of AI and serverless applications
vulnerabilities can be the contributing factors to security threat of cyberspace. Ransomeware
is classified under malware and in this data on the computer system of the victim is locked
and the cyber criminal demands for ransom. The victim is given access to the system only
when the amount demanded by the cyber criminal is provided to him. There have always
been security threats to businesses but at present it has shifted from being physical to
cyberspace. Business are adopting new technologies like AI and in this information driven
age there are high chances that data can be misused by cyber criminals. The data in this age
of artificial intelligence is the greatest weapon for anyone who wants to disrupt operations of
a business (Tankard 2015). Hackers are able to break through the programming and
manipulate artificial intelligence. It can be made used of by the hackers to launch
sophisticated attacks on various operations. Thus, other than the growing use of internet these
can be said to be as the possible contributing factors to the overall security threat of
cyberspace.
3. Your organization has just recovered from an intrusion, and as a proactive measure
your CISO has mandated all vulnerabilities be located and remediated in the network.
Describe in detail how you would go about doing this, ie, software, procedures, policies?
Is it even possible?
Ans3. This can be done by risk assessment which is the perfect process that can be made use
of in this context. This will help the business to gather information related to potential
vulnerabilities in the systems along with the operations. The primary areas that need to be
considered for this purpose are third party vendors, regulations and policy, security
management, emerging technologies, incident and crisis management, awareness and
Cybersecurity - Question & Answer_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wi-Fi Protected Access: A Secure Communication Protocol
|12
|782
|60

Wireless Network Routing and Switching - Assignment
|9
|1050
|121

Electronic Security
|2
|1473
|73

The Brute Force Password Crack
|9
|1108
|143

Presentation on VPN Networks
|14
|743
|173

Emerging Wireless Communication and Network Technologies
|4
|1346
|50